Main menu

strict warning: Non-static method view::load() should not be called statically in /home3/indiciat/public_html/sites/all/modules/views/views.module on line 1113.

strict warning: Declaration of views_handler_argument::options_validate() should be compatible with views_handler::options_validate($form, &$form_state) in /home3/indiciat/public_html/sites/all/modules/views/handlers/views_handler_argument.inc on line 917.

strict warning: Declaration of views_handler_argument::query() should be compatible with views_handler::query($group_by = false) in /home3/indiciat/public_html/sites/all/modules/views/handlers/views_handler_argument.inc on line 917.

strict warning: Declaration of views_handler_sort::options_validate() should be compatible with views_handler::options_validate($form, &$form_state) in /home3/indiciat/public_html/sites/all/modules/views/handlers/views_handler_sort.inc on line 165.

strict warning: Declaration of views_handler_sort::options_submit() should be compatible with views_handler::options_submit($form, &$form_state) in /home3/indiciat/public_html/sites/all/modules/views/handlers/views_handler_sort.inc on line 165.

strict warning: Declaration of views_handler_sort::query() should be compatible with views_handler::query($group_by = false) in /home3/indiciat/public_html/sites/all/modules/views/handlers/views_handler_sort.inc on line 165.

strict warning: Declaration of views_handler_filter::options_validate() should be compatible with views_handler::options_validate($form, &$form_state) in /home3/indiciat/public_html/sites/all/modules/views/handlers/views_handler_filter.inc on line 587.

strict warning: Declaration of views_handler_filter::query() should be compatible with views_handler::query($group_by = false) in /home3/indiciat/public_html/sites/all/modules/views/handlers/views_handler_filter.inc on line 587.

strict warning: Declaration of views_handler_filter_node_status::operator_form() should be compatible with views_handler_filter::operator_form(&$form, &$form_state) in /home3/indiciat/public_html/sites/all/modules/views/modules/node/views_handler_filter_node_status.inc on line 13.

strict warning: Declaration of views_plugin_argument_validate::options_submit() should be compatible with views_plugin::options_submit($form, &$form_state) in /home3/indiciat/public_html/sites/all/modules/views/plugins/views_plugin_argument_validate.inc on line 87.

strict warning: Declaration of views_plugin_argument_validate_taxonomy_term::options_submit() should be compatible with views_plugin_argument_validate::options_submit(&$form, &$form_state) in /home3/indiciat/public_html/sites/all/modules/views/modules/taxonomy/views_plugin_argument_validate_taxonomy_term.inc on line 165.

strict warning: Non-static method view::load() should not be called statically in /home3/indiciat/public_html/sites/all/modules/views/views.module on line 1113.

strict warning: Declaration of views_plugin_query::options_submit() should be compatible with views_plugin::options_submit($form, &$form_state) in /home3/indiciat/public_html/sites/all/modules/views/plugins/views_plugin_query.inc on line 169.

strict warning: Declaration of views_plugin_style_default::options() should be compatible with views_object::options() in /home3/indiciat/public_html/sites/all/modules/views/plugins/views_plugin_style_default.inc on line 24.

strict warning: Declaration of views_plugin_row::options_validate() should be compatible with views_plugin::options_validate(&$form, &$form_state) in /home3/indiciat/public_html/sites/all/modules/views/plugins/views_plugin_row.inc on line 136.

strict warning: Non-static method view::load() should not be called statically in /home3/indiciat/public_html/sites/all/modules/views/views.module on line 1113.

strict warning: Non-static method view::load() should not be called statically in /home3/indiciat/public_html/sites/all/modules/views/views.module on line 1113.

strict warning: Non-static method view::load() should not be called statically in /home3/indiciat/public_html/sites/all/modules/views/views.module on line 1113.

strict warning: Non-static method view::load() should not be called statically in /home3/indiciat/public_html/sites/all/modules/views/views.module on line 1113.

strict warning: Non-static method view::load() should not be called statically in /home3/indiciat/public_html/sites/all/modules/views/views.module on line 1113.

strict warning: Non-static method view::load() should not be called statically in /home3/indiciat/public_html/sites/all/modules/views/views.module on line 1113.

strict warning: Non-static method view::load() should not be called statically in /home3/indiciat/public_html/sites/all/modules/views/views.module on line 1113.

strict warning: Non-static method view::load() should not be called statically in /home3/indiciat/public_html/sites/all/modules/views/views.module on line 1113.

strict warning: Non-static method view::load() should not be called statically in /home3/indiciat/public_html/sites/all/modules/views/views.module on line 1113.

strict warning: Non-static method view::load() should not be called statically in /home3/indiciat/public_html/sites/all/modules/views/views.module on line 1113.

strict warning: Non-static method view::load() should not be called statically in /home3/indiciat/public_html/sites/all/modules/views/views.module on line 1113.

strict warning: Non-static method view::load() should not be called statically in /home3/indiciat/public_html/sites/all/modules/views/views.module on line 1113.

strict warning: Non-static method view::load() should not be called statically in /home3/indiciat/public_html/sites/all/modules/views/views.module on line 1113.

strict warning: Non-static method view::load() should not be called statically in /home3/indiciat/public_html/sites/all/modules/views/views.module on line 1113.

strict warning: Non-static method view::load() should not be called statically in /home3/indiciat/public_html/sites/all/modules/views/views.module on line 1113.

strict warning: Non-static method view::load() should not be called statically in /home3/indiciat/public_html/sites/all/modules/views/views.module on line 1113.

strict warning: Non-static method view::load() should not be called statically in /home3/indiciat/public_html/sites/all/modules/views/views.module on line 1113.

strict warning: Non-static method view::load() should not be called statically in /home3/indiciat/public_html/sites/all/modules/views/views.module on line 1113.

strict warning: Non-static method view::load() should not be called statically in /home3/indiciat/public_html/sites/all/modules/views/views.module on line 1113.

strict warning: Non-static method view::load() should not be called statically in /home3/indiciat/public_html/sites/all/modules/views/views.module on line 1113.

strict warning: Non-static method view::load() should not be called statically in /home3/indiciat/public_html/sites/all/modules/views/views.module on line 1113.

strict warning: Non-static method view::load() should not be called statically in /home3/indiciat/public_html/sites/all/modules/views/views.module on line 1113.

strict warning: Non-static method view::load() should not be called statically in /home3/indiciat/public_html/sites/all/modules/views/views.module on line 1113.

strict warning: Non-static method view::load() should not be called statically in /home3/indiciat/public_html/sites/all/modules/views/views.module on line 1113.

warning: preg_replace(): Compilation failed: invalid range in character class at offset 11 in /home3/indiciat/public_html/sites/all/themes/indiciatraining/template.php on line 170.

warning: preg_replace(): Compilation failed: invalid range in character class at offset 11 in /home3/indiciat/public_html/sites/all/themes/indiciatraining/template.php on line 170.

warning: preg_replace(): Compilation failed: invalid range in character class at offset 11 in /home3/indiciat/public_html/sites/all/themes/indiciatraining/template.php on line 170.

warning: preg_replace(): Compilation failed: invalid range in character class at offset 11 in /home3/indiciat/public_html/sites/all/themes/indiciatraining/template.php on line 170.

warning: preg_replace(): Compilation failed: invalid range in character class at offset 11 in /home3/indiciat/public_html/sites/all/themes/indiciatraining/template.php on line 170.

warning: preg_replace(): Compilation failed: invalid range in character class at offset 11 in /home3/indiciat/public_html/sites/all/themes/indiciatraining/template.php on line 170.

warning: preg_replace(): Compilation failed: invalid range in character class at offset 11 in /home3/indiciat/public_html/sites/all/themes/indiciatraining/template.php on line 170.

warning: preg_replace(): Compilation failed: invalid range in character class at offset 11 in /home3/indiciat/public_html/sites/all/themes/indiciatraining/template.php on line 170.

warning: preg_replace(): Compilation failed: invalid range in character class at offset 11 in /home3/indiciat/public_html/sites/all/themes/indiciatraining/template.php on line 170.

warning: preg_replace(): Compilation failed: invalid range in character class at offset 11 in /home3/indiciat/public_html/sites/all/themes/indiciatraining/template.php on line 170.

warning: preg_replace(): Compilation failed: invalid range in character class at offset 11 in /home3/indiciat/public_html/sites/all/themes/indiciatraining/template.php on line 170.

warning: preg_replace(): Compilation failed: invalid range in character class at offset 11 in /home3/indiciat/public_html/sites/all/themes/indiciatraining/template.php on line 170.

warning: preg_replace(): Compilation failed: invalid range in character class at offset 11 in /home3/indiciat/public_html/sites/all/themes/indiciatraining/template.php on line 170.

warning: preg_replace(): Compilation failed: invalid range in character class at offset 11 in /home3/indiciat/public_html/sites/all/themes/indiciatraining/template.php on line 170.

warning: preg_replace(): Compilation failed: invalid range in character class at offset 11 in /home3/indiciat/public_html/sites/all/themes/indiciatraining/template.php on line 170.

warning: preg_replace(): Compilation failed: invalid range in character class at offset 11 in /home3/indiciat/public_html/sites/all/themes/indiciatraining/template.php on line 170.

warning: preg_replace(): Compilation failed: invalid range in character class at offset 11 in /home3/indiciat/public_html/sites/all/themes/indiciatraining/template.php on line 170.

warning: preg_replace(): Compilation failed: invalid range in character class at offset 11 in /home3/indiciat/public_html/sites/all/themes/indiciatraining/template.php on line 170.

warning: preg_replace(): Compilation failed: invalid range in character class at offset 11 in /home3/indiciat/public_html/sites/all/themes/indiciatraining/template.php on line 170.

warning: preg_replace(): Compilation failed: invalid range in character class at offset 11 in /home3/indiciat/public_html/sites/all/themes/indiciatraining/template.php on line 170.

warning: preg_replace(): Compilation failed: invalid range in character class at offset 11 in /home3/indiciat/public_html/sites/all/themes/indiciatraining/template.php on line 170.

warning: preg_replace(): Compilation failed: invalid range in character class at offset 11 in /home3/indiciat/public_html/sites/all/themes/indiciatraining/template.php on line 170.

warning: preg_replace(): Compilation failed: invalid range in character class at offset 11 in /home3/indiciat/public_html/sites/all/themes/indiciatraining/template.php on line 170.

warning: preg_replace(): Compilation failed: invalid range in character class at offset 11 in /home3/indiciat/public_html/sites/all/themes/indiciatraining/template.php on line 170.

warning: preg_replace(): Compilation failed: invalid range in character class at offset 11 in /home3/indiciat/public_html/sites/all/themes/indiciatraining/template.php on line 170.

We provide training and certification for leading technologies, including Microsoft, Cisco, Oracle, Java, Citrix, Unix and VMware

Please call 0141 221 5676 for course information and available dates or email us at info@indiciatraining.com.

This course describes how to configure and manage a System Center 2012 R2 Configuration Manager site and its associated site systems. The course focuses on day-to-day management tasks for System Center 2012 R2 Configuration Manager.

MS 10747D: Administering System Center 2012 Configuration Manager

Duration

5 days

Course Overview

This course describes how to configure and manage a System Center 2012 R2 Configuration Manager site and its associated site systems. The course focuses on day-to-day management tasks for System Center 2012 R2 Configuration Manager.

Target Audience

The primary audience for this course is intended for IT Professionals who are responsible for configuring and managing endpoints in one or more System Center 2012 R2 Configuration Manager sites and all supporting systems. They have one to three years of experience managing and maintaining client computers, devices, and servers in medium to large enterprise organizations. Administrators may have previous Configuration Manager experience, or be new to the product.

The secondary audience for this course is intended for individuals who are interested in taking exam 70-243 TS: Microsoft System Center 2012 Configuration Manager, Configuring. Both 10747D: Administering System Center 2012 R2 Configuration Manager, and 10748C: Planning and Deploying System Center 2012 Configuration Manager, are necessary to prepare for this exam.

Module 1: Overview of System Center 2012 R2 Configuration ManagerIn this module, you will learn about the basic features of System Center 2012 R2 Configuration Manager, the various types of sites, and the site system roles that you can deploy. System Center 2012 R2 Configuration Manager takes advantage of a redesign of several features in previous versions of Configuration Manager. This module covers the enhancements and modifications made to the Configuration Manager console. You will explore the interface of the Configuration Manager console and learn how to navigate it to locate and use important features. Additionally, you will review the tools that are available for monitoring and troubleshooting Configuration Manager.

After completing this module, students will be able to:• Describe the purpose and functionality of System Center 2012 R2 Configuration Manager.• Describe the System Center 2012 R2 Configuration Manager architecture.• Identify and locate the management features available in the Configuration Manager console.• Identify and use the tools available to monitor and troubleshoot a Configuration Manager site.

Module 2: Discovering and Organizing ResourcesYou can manage computer and user resources within a System Center 2012 R2 Configuration Manager environment only when Configuration Manager has discovered these resources and assigned them to a site. In this module, you will learn about boundaries and boundary groups that help create logical network locations that contain discovered computers based upon IP addresses or Active Directory sites. You can use these boundary configurations for client site assignment and for helping clients find content from associated site systems. You also will learn about the discovery processes that you can use to identify computers, users, and the network infrastructure within your network environment. You then will learn about collections that support logical groupings of resources. You use these groupings for management tasks such as targeting software updates, managing applications, or deploying compliance settings to resources.

Additionally, you will learn to implement role-based administration by using security roles, security scopes, and collections. Role-based administration determines both the tasks that an administrative user can perform, and the objects and resources on which the user can perform those tasks.

After completing this module, students will be able to:• Configure boundaries and boundary groups.• Configure resource discovery.• Configure user and device collections.• Configure role-based administration.

Module 3: Managing the Configuration Manager Client AgentYou can install the System Center 2012 R2 Configuration Manager client agent software on devices such as workstations, laptops, servers, and mobile devices. Then, you can manage these devices and perform operations such as reporting hardware and software inventory information, installing software, and con¬figuring settings required for compliance. Configuration Manager provides several options for installing the client software. This module explains the supported operating systems and devices, the software requirements, and the different methods for installing the client software. After installing the client software, you can configure the client settings to perform routine management tasks. This module describes some of the default and custom client settings that you can configure. The module also describes how to monitor the operations and client health of the Configuration Manager client agent software by using alerts and the client health evaluator.

After completing this module, students will be able to:• Describe the requirements and considerations for installing the Configuration Manager client agent.• Deploy the Configuration Manager client agent.• Manage client settings.• Configure and monitor client health.

Module 4: Managing Inventory and Software MeteringThe first feature that you likely will use in your Microsoft System Center 2012 R2 Configuration Manager implementation is inventory collection. Collecting hardware and software details provides a foundation that you can use with many other advanced features, such as application deployment. For example, you can use inventory details such as memory, operating system, IP address, or installed applications to identify clients that might need an upgrade, or as a basis for creating custom collections. To enhance standard inventory collection, you can implement the Asset Intelligence feature to provide additional data for reports and information about the software titles installed on specific clients.Software metering provides a way to monitor and collect software usage data from your System Center 2012 R2 Configuration Manager clients. When you combine this data with software inventory and the Asset Intelligence feature, this can help you determine a number of software-usage scenarios, so that you can plan software deployments and licensing.

Module 5: Querying and Reporting DataMicrosoft System Center 2012 R2 Configuration Manager stores a large amount of data about the devices in your environment. You may not always want to perform all management tasks on all of the devices simultaneously. Therefore, to help you locate devices in your environment that meet specific criteria, you can create queries. You then can use these queries to create collections or to find clients and install the Configuration Manager client on them. This module describes queries and the methods to create and run them. Additionally, you may want to run reports about your environment. To be able to run Configuration Manager reports, you have to install a reporting services point, which this module details.

After completing this module, students will be able to:• Describe data and status message queries.• Configure and manage data and status message queries.• Configure and manage Microsoft SQL Server Reporting Services in Configuration Manager.

Module 6: Managing Software Distribution and Deployment by Using Packages and ProgramsTraditionally, Microsoft Systems Management Server 2003 and Microsoft System Center Configuration Manager 2007 product lines utilized packages and programs for deploying software. System Center 2012 Configuration Manager introduced the concept of applications, which provides a new software deployment model that is more flexible than the conventional packages and programs. However, this did not eliminate the need to use packages and programs.

Typically, you will deploy software to computers running Windows and Apple OS X by using applications. However, you can still use packages and programs in many situations for Windows-based computers. For example, you can deliver content to Windows-based clients to support running scripts. Additionally, you can use packages and programs to deploy content to Linux and UNIX-based computers.

This module is the first of many that focus on software deployment. This module describes how to manage software by using packages and programs, while subsequent modules cover the application-management model.

After completing this module, students will be able to:• Describe the software deployment process and configure software deployment settings.• Configure packages and programs.• Distribute content to distribution points.• Deploy programs to Configuration Manager clients.

Module 7: Creating and Deploying ApplicationsThe System Center 2012 R2 Configuration Manager application deployment model enhances the capabilities of packages and programs for delivery of software to Windows operating systems, the Mac operating system (Mac OS X), and mobile devices. When deploying to Windows, System Center 2012 R2 Configuration Manager, in addition to packages and programs, uses Configuration Manager applications. These applications are best for deploying installer-based software, such as Windows installations that are .msi-file based. This is because they provide a more intelligent software deployment model.

With the Configuration Manager application deployment model, you can create a single deployment for Windows-based clients and mobile device clients that provide different installation options depending on specifically defined conditions. For example, you can install an application locally on user’s primary devices and deploy a virtual version of the application when they are on other devices, all through the same deployment. You can do this by using features such as requirements and dependencies. Additional features, such as state-based reporting and detection methods, can help you create intelligent deployments.

In this module, you will learn about the application model and the basics for creating, deploying, and managing applications with Configuration Manager. You will also learn how to use Configuration Manager Software Center and Configuration Manager Application Catalog to install available applications.

After completing this module, students will be able to:• Describe application management in Configuration Manager.• Create applications.• Deploy applications.• Manage applications.

Module 8: Deploying Additional Application TypesWindows 8 has introduced a new application type named the Windows Store app, which is designed specifically to run on devices running Windows 8. Windows Store apps have a new .appx extension, which facilitates your installation to multiple device types across the Internet and within your enterprise. Microsoft System Center 2012 R2 Configuration Manager allows you to install Windows Store apps to devices running Windows 8 either by linking to Windows Store apps or by installing .appx files directly.

In many cases, you might want your users to have access to an application that is not installed directly on their computer. Microsoft Application Virtualization (App-V) allows you to install applications in an isolated, nonpermanent environment on a Windows-based computer. Managing virtualized applications with System Center 2012 R2 Configuration Manager is similar to managing other applications.

In this module, you will learn about managing deployments on unconventional applications. This module describes how to install Windows Store apps and virtualized applications.

After completing this module, students will be able to:• Deploy Windows Store apps by using System Center 2012 R2 Configuration Manager• Deploy virtual applications by using System Center 2012 R2 Configuration Manager

Module 9: Deploying and Managing Software UpdatesFor many organizations, maintaining software updates is a priority, and is at the top of administrators’ network-management tasks. Software update management helps ensure that computer devices maintain operational efficiency, and helps maintain the stability of the network infrastructure.

By using the software updates feature in Configuration Manager, you can implement an end-to-end management process for the complex task of identifying, deploying, and monitoring software updates to your Configuration Manager clients.

After completing this module, students will be able to:• Describe how the software updates feature integrates with System Center 2012 R2 Configuration Manager.• Prepare a Configuration Manager site for software updates.• Configure a site for software updates.• Manage the evaluation and deployment of software updates.• Configure automatic deployment rules.• Monitor and troubleshoot software updates.

Module 10: Implementing Endpoint Protection by Using System Center 2012 R2 Configuration ManagerSystem Center 2012 R2 Configuration Manager provides a number of security-related features that you can use to help protect client computers from malware threats and configure specific Windows Firewall settings for clients. Based on System Center 2012 Endpoint Protection functionality, Endpoint Protection in Configuration Manager 2012 supports the deployment, management, and monitoring of antimalware policies and Windows Firewall settings on client computers.

After completing this module, students will be able to:• Describe how to use Endpoint Protection to detect and remediate malware and security vulnerabilities.• Configure, deploy, and manage Endpoint Protection policies.

Module 11: Managing Operating Systems DeploymentYou can use the operating system deployment feature in System Center 2012 R2 Configuration Manager to create hard drive images that you can deploy to unmanaged computers and those that Configure Manager manages. There are several scenarios in which you can deploy operating systems by using Configuration Manager, including when you are working with new systems or when you are upgrading existing ones. Operating system deployment uses both Configuration Manager and Windows components to manage and deliver operating system images. You can configure settings on a reference computer prior to capturing an image of its hard drive or by using task sequences that Configuration Manager creates after you deploy the image to a target system.

Lessons• Overview of Operating System Deployment• Preparing a Site for Operating System Deployment• Building and Capturing a Reference Operating System Image• Deploying an Operating SystemLab: Preparing the Environment for Operating System Deployment• Managing the Site System Roles Used to Support Operating System Deployment• Managing Packages to Support Operating System DeploymentLab: Building and Capturing a Reference Image• Creating a Build and Capture Task Sequence• Capturing the Reference ComputerLab: Performing an In-Place Upgrade• Creating a Task Sequence to Deploy an Image• Deploying an Image

After completing this module, students will be able to:• Describe the terminology, components, and scenarios used to deploy operating systems by using System Center 2012 R2 Configuration Manager.• Describe how to prepare a site for operating system deployment.• Describe how to build and capture a reference operating system image.• Describe the process used to deploy an operating system image.

Module 12: Managing Compliance Settings and ProfilesOne of the more difficult tasks that information technology (IT) administrators face is to ensure that all the systems in their organization use, and retain, an optimal configuration at all times. IT administrators and team members must have confidence that the systems’ configurations are correct, regardless of whether they are monitoring changes to servers or documenting compliance requirements. The compliance settings feature can play a key role in documenting existing configurations, in quickly discovering systems that have undesired configuration changes, and in automatically remediating some undesired configurations. This module will detail the compliance settings feature, and how you can use it to manage your systems.

After completing this module, students will be able to:• Describe the compliance settings feature.• Configure the compliance settings feature.• View compliance results.

Module 13: Mobile Device Management Using System Center 2012 R2 Configuration ManagerIncreasingly, users are using mobile devices not only to retrieve their email messages and synchronize calendar appointments, but also to work on files and documents outside of the office. Additionally, more and more users are utilizing important line-of-business (LOB) applications that enable them to be productive whenever and wherever work calls. These users often use mobile devices for tasks that they might previously have performed only on desktop computers. Therefore, many organizations are considering the management of mobile devices in ways that they previously reserved for desktop computers. In this module, you will learn about performing mobile device management by using the Microsoft Exchange Server connector for Microsoft System Center 2012 R2 Configuration Manager. You will also learn how you can integrate Windows Intune with Configuration Manager for mobile device management.

After completing this module, students will be able to:• Explain the functionality of the Exchange Server connector.• Describe the functionality of Windows Intune.• Configure the Windows Intune connector for System Center 2012 R2 Configuration Manager.• Enroll mobile devices for management by Configuration Manager.• Deploy applications to mobile devices.

Module 14: Configuring Wake On LAN, Power Management, and Remote ControlManaging client computers remotely is an integral part of managing a network efficiently and is a key feature in System Center 2012 R2 Configuration Manager. Typically, it is not feasible, logistically or financially, to travel to a client workstation to perform minor repairs or assist with software issues. Additionally, you may not always want to have computers running before you deploy software applications or updates. To help reduce energy costs and environmental impact, you may want to monitor and implement corporate-wide power management policies that you can use to control the state of client computers. There also may be situations in which you need to reconfigure BIOS settings on remote computers, or turn on or off remote computers. System Center 2012 R2 Configuration Manager supports various types of remote-management tasks by using Wake On LAN, power-management policies, Remote Control, and out of band management features.

Lessons• Configuring Wake On LAN• Overview of Out of Band Management• Configuring Power Management Settings• Configuring Remote ControlLab: Configuring Power Management Settings• Applying a Power Management PlanLab: Configuring Remote Control• Configuring the Remote Tools Client Settings and Permissions• Managing Desktops by Using Remote Control

After completing this module, students will be able to:• Configure the Configuration Manager Wake On LAN feature.• Describe out of band management.• Configure power-management settings.• Configure Remote Control features.

Please call 0141 221 5676 for course information and available dates or email us at info@indiciatraining.com.

This course describes how to plan and deploy a Microsoft System Center 2012 Configuration hierarchy, inlcuding the central administration site, onw or more primary sites and secondary sites, and all associated site systems. This course also covers migration from System Center Cofiguration Mnager 2007.

MS 10748: Deploying System Center 2012 Configuration Manager

Duration

3 days

Course Overview

This course describes how to plan and deploy a Microsoft System Center 2012 Configuration Manager hierarchy, including the central administration site, one or more primary sites and secondary sites, and all associated site systems. This course also covers migration from System Center Configuration Manager 2007.

Target Audience

This course is intended for:

Systems Engineers who need to plan a Microsoft System Center 2012 Configuration Manager deployment. They have three to five years of experience in medium to large enterprise organizations supporting multiple desktop and server computers that run Microsoft Windows

Configuration Manager Administrators responsible for designing and deploying one or more System Center 2012 Configuration Manager sites and all supporting systems. They have three to five years of experience in medium to large enterprise organizations supporting multiple desktop and server computers that run Microsoft Windows Server

Individuals who are interested in taking exam 70-243: Administering and Deploying System Center 2012 Configuration Manager, can also attend this course. Both this course and course 10747A: Administering System Center 2012 Configuration Manager will help to prepare for the exam.

Plan and deploy a multiple-site hierarchy including the central administration site, primary sites, and secondary sites.Describe replication and data types, and monitor the replication of data throughout the hierarchy.

Use various methods to plan and deploy Configuration Manager 2012 clients.

Overview of the Configuration Manager 2012 Server Default Site System Roles

Overview of the Configuration Manager 2012 Server Optional Site System Roles

Overview of Configuration Manager 2012 Deployment Scenarios

After completing this module, students will be able to:

Describe the System Center 2012 Configuration Manager architecture.

Describe the Configuration Manager 2012 server infrastructure.

Describe typical Configuration Manager 2012 deployment scenarios.

Describe the Configuration Manager 2012 client.

Module 2: Planning and Deploying a Stand-Alone Primary Site

This module explains the planning process, inputs, and typical planning activities for deploying a stand-alone primary site. It also describes the prerequisites for installing a site server and related components, the process of installing, configuring, and monitoring a stand-alone primary site. This module also describes the requirements for managing Internet-based clients and configuring a Microsoft PKI solution.

Please call 0141 221 5676 for course information and available dates or email us at info@indiciatraining.com.

This two-day instructor-led course provides students with the knowledge and skills to envision, design, and deploy web access, remote access and mail protection solutions using Microsoft Forefront Threat Management Gateway 2010 (TMG), enabling them to identify the requirements and make the appropriate design decisions that will come up during the deployment process, and providing hands-on experience with the products.

MS 50357B: Implementing Forefront Threat Management Gateway 2010

Duration

2 days

Course Overview

This two-day instructor-led course provides students with the knowledge and skills to envision, design, and deploy web access, remote access and mail protection solutions using Microsoft Forefront Threat Management Gateway 2010 (TMG), enabling them to identify the requirements and make the appropriate design decisions that will come up during the deployment process, and providing hands-on experience with the products.

Target Audience

This course is intended for Architects, Consultants, and Technical Sales Professionals involved in designing, deploying, or operating security solutions.

Course Objectives

After completing this course, students will be able to:

Understand the new features and the value proposition for Forefront TMG.

Identify the key Forefront TMG features that address those threats (application proxy, granular access control, malware inspection, URL filtering, HTTPS inspection, NIS), and describe each of these features in detail.

Module 3: Remote Access Gateway

This module explains the new features introduced in Forefront TMG 2010 can be used to enable users to securely access corporate network resources from anywhere.

Lessons

Remote Access Gateway Overview

Non-HTTP Server Publishing

Web Publishing

Virtual Private Networking (VPN) Connectivity

Lab : Remote Access Gateway

Use Web Publishing to publish Exchange Web Services

After completing this module, students will be able to:

Understand how Forefront TMG can publish Web and non-Web services to external users.

Explain the security features and benefits added by Forefront TMG in each of these publishing scenarios.

Discuss the new Forefront TMG features for virtual private networking, such as Secure SocketTunneling Protocol (SSTP) and Network Access Protection (NAP).

Module 4: Secure Mail Relay

This module explains how Forefront TMG 2010 and Forefront Protection 2010 for Exchange Server can work together with Microsoft Exchange Server to provide premium protection from spam and malware.

Lessons

Secure Mail Relay Overview

Solution Components

Configuring SMTP Protection

Lab : Secure Mail Relay

Install Active Directory LDS and Exchange Edge Server

Install Forefront Protection 2010 for Exchange Server

Install Forefront Threat Management Gateway

Configure Exchange EdgeSync

Define an E-mail Policy

After completing this module, students will be able to:

Describe the mail threats facing organization, and explain what the key Forefront TMG features are that address these threats.

Explain how Forefront TMG and Forefront Protection 2010 for Exchange Server are deployed together for premium antispam and antimalware protection.

Please call 0141 221 5676 for course information and available dates or email us at info@indiciatraining.com.

This Oracle Database 11g Release 2 DBA - Part II course introduces the delegate to advanced administration tasks. Participants will learn how to plan and implement a backup and recovery strategy using Recovery Manager. They will also learn how to control database resources using the Resource Manager; how to automate administration tasks with the Scheduler and how to carry out performance monitoring and tuning.

Oracle Database 11g Release 2 DBA - Part II Course Overview

Duration

5 Days

Course Overview

This Oracle Database 11g Release 2 DBA - Part II course introduces the delegate to advanced administration tasks. Participants will learn how to plan and implement a backup and recovery strategy using Recovery Manager. They will also learn how to control database resources using the Resource Manager; how to automate administration tasks with the Scheduler and how to carry out performance monitoring and tuning.

This Oracle Database 11g Release 2 DBA - Part II course is suitable for both users of Release 1 and Release 2.

Course Objectives

The Oracle Database 11g Release 2 DBA - Part II course introduces delegates to the main concepts of Oracle backup and recovery. They will learn how to plan and implement a backup and recovery strategy using RMAN. Delegates will also learn to manage memory effectively, carry out some evaluation and tuning exercises, control database resources using Resource Manager and automate tasks with the Scheduler.

The delegate will practise:

Planning a backup strategy and a disaster recovery strategy

Altering a database to archivelog and noarchivelog modes

Managing memory

Using Recovery Manager to perform backups and restorations

Using Flashback technology to diagnose and repair a database

Reviewing database logs for diagnostic purposes

Using Database advisors and views to monitor and improve database performance

Controlling database resources using Resource Manager

Automating management tasks with the Scheduler

Target Audience

This Oracle Database 11g Release 2 DBA - Part II course is designed for database administrators and technical support staff who are required to plan and implement database backup and recovery strategies for Oracle Database 11g Release 1 or Release 2 databases. Administrators will also learn about the tools available to monitor database performance and the steps that can be taken to improve database performance.

Before taking any exam, ensure you have the recommended experience. The Oracle website lists all exam requirements and these are updated regularly.

Pre-Requisites

Delegates who wish to attend this Oracle Database 11g Release 2 DBA - Part II course should have a working knowledge of Oracle SQL and Oracle Database Administration, good operating system knowledge is also essential. This can be obtained by attendance on the Oracle SQL and Oracle Database 11g DBA - Part I courses. Knowledge of PL/SQL would be beneficial.

Delegates should have attended the following courses or equivalent

-Oracle SQL

-Oracle Database 11g Release 2 DBA - Part I

This Oracle Database 11g Release 2 DBA - Part II course introduces the delegate to advanced administration tasks. Participants will learn how to plan and implement a backup and recovery strategy using Recovery Manager. They will also learn how to control database resources using the Resource Manager; how to automate administration tasks with the Scheduler and how to carry out performance monitoring and tuning.

This Oracle Database 11g Release 2 DBA - Part II course is suitable for both users of Release 1 and Release 2.

Please call 0141 221 5676 for course information and available dates or email us at info@indiciatraining.com.

Get hands-on instruction and practice administering Windows Server 2012, including Windows Server 2012 R2, in this five-day Microsoft Official Course. This course is part two in a series of three courses that provides the skills and knowledge necessary to implement a core Windows Server 2012 infrastructure in an existing enterprise environment.

MS 20411D: Administering Windows Server 2012

Duration

5 days

Course Overview

Get hands-on instruction and practice administering Windows Server 2012, including Windows Server 2012 R2, in this five-day Microsoft Official Course. This course is part two in a series of three courses that provides the skills and knowledge necessary to implement a core Windows Server 2012 infrastructure in an existing enterprise environment.

The three courses collectively cover implementing, managing, maintaining and provisioning services and infrastructure in a Windows Server 2012 environment. Although there is some cross-over of skills and tasks across these courses, this course focuses on the administration tasks necessary to maintain a Windows Server 2012 infrastructure such as configuring and troubleshooting name resolution, user and group management with Active Directory Domain Services (AD DS) and Group Policy, implementing Remote Access solutions such as DirectAccess, VPNs and Web Application Proxy, implementing Network Policies and Network Access Protection, Data Security, deployment and maintenance of server images, as well as update management and monitoring of Windows Server 2012 environments.

This course maps directly to and is the preferred choice for hands-on preparation for Microsoft Certified Solutions Associate (MCSA): Exam 411: Administering Windows Server 2012, which is the second of three exams required for MCSA: Windows Server 2012 credential.

Labs in this course are based on Windows Server 2012 R2 and Windows 8.1.

Target Audience

This course is intended for Information Technology (IT) Professionals with hands on experience working in a Windows server 2008 or Windows Server 2012 environment who wish to acquire the skills and knowledge necessary to be able to manage and maintain the core infrastructure required for a Windows Server 2012 and Windows Server 2012 R2 environment. The key focus for students is to broaden the initial deployment of Windows Server 2012 services and infrastructure and provide the skills necessary to Manage and Maintain a domain based Windows Server 2012 environment, providing skills in areas such as User and Group management, Network Access and Data Security. Candidates typically interested in attending this course would be

• Windows Server Administrators experienced in working with Windows Server 2008 or Windows Server 2012 who wish to gain skills necessary to perform daily management and maintenance tasks in a Windows Server 2012 or Windows Server 2012 R2 environment.• IT Professionals who are looking to take the 411, Administering Windows Server 2012 exam• IT professional wishing to take the Microsoft Certified Solutions Expert (MCSE) exams in DataCenter, Desktop Infrastructure, Messaging, Collaboration and Communications will also be interested in taking this course as they prepare for the Microsoft Certified Solutions Associate (MCSA) exams, which are a pre-requisite for their individual specialties.

Before attending this course, students must have:• Knowledge and skills concerning the initial implementation and configuration of core Windows Server services including Active Directory Domain Services (AD DS), Networking Services and Microsoft Hyper-V.

The course pre-requisites can be met by having knowledge equivalent to, or by attendance at, course 20410D: Installing and Configuring Windows Server 2012, as this course will build upon that knowledge and skills covered in that course.

Course Contents

Module 1: Configuring and Troubleshooting Domain Name SystemThis module explains how to configure and troubleshoot DNS, including DNS replication and caching.

After completing this module, students will be able to:• Implement virtualized domain controllers.• Implement RODCs.• Administer AD DS.• Manage the AD DS database

Module 3: Managing User and Service AccountsThis module explains how to create, configure and automate the creation of user accounts. It also explains how to configure account-related properties of user objects. It further explains how to create and administer Managed Service Accounts.

After completing this module, students will be able to:• Configure password policy and user account lockout settings.• Configure managed service accounts.

Module 4: Implementing a Group Policy InfrastructureThis module explains how to implement a GPO infrastructure. This also teaches how to perform common GPO management tasks, and manage GPOs by using Windows PowerShell. It also focuses on troubleshooting the application of GPOs.

After completing this module, students will be able to:• Explain what Group Policy is.• Implement and administer Group Policy Objects (GPOs).• Manage Group Policy scope and Group Policy processing.• Troubleshoot the application of GPOs.

Module 5: Managing User Desktops with Group PolicyThis module explains how you can use Group Policy Objects (GPOs) to implement desktop environments across your organization by using Administrative Templates, Folder Redirection, Group Policy preferences, and where applicable, use software deployment to install and update application programs. It is important to know how to use these various GPO features so that you can configure your users’ computer settings properly.

After completing this module, students will be able to:• Configure folder redirection and scripts by using GPOs.• Describe and implement Administrative Templates. • Configure GPO preferences.• Deploy software by using GPOs.

Module 6: Installing, Configuring, and Troubleshooting the Network Policy Server RoleThis module explains how to install and configure NPS, RADIUS Clients and servers. It also describes NPS authentication methods. It describe NPS authentication methods and how to monitor and troubleshoot NPS.

After completing this module, students will be able to:• Install and configure a Network Policy Server (NPS).• Configure clients and servers with the Remote Authentication Dial-In User Service (RADIUS) protocol.• Explain NPS authentication methods.• Monitor and troubleshoot NPS.

Module 7: Implementing Network Access ProtectionThis module explains how to configure, monitor, and troubleshoot NAP. It also explains how NAP can help to protect your network and the various NAP enforcement processes.

After completing this module, students will be able to:• Describe how NAP can help to protect your network.• Describe the various NAP enforcement processes.• Configure NAP.• Monitor and troubleshoot NAP.

Module 8: Implementing Remote AccessIn this module, you will learn how to implement and manage remote access in Windows Server 2012. You will also learn how to implement DirectAccess by using the Getting Started wizard, implement and manage an advanced DirectAccess infrastructure, and implement VPN.

After completing this module, students will be able to:• Install and manage the Remote Access role in Windows Server 2012 operating system.• Implement DirectAccess by using the Getting Started Wizard.• Implement and manage an advanced DirectAccess Infrastructure.• Implement VPN access.• Implement Web Application Proxy.

After completing this module, students will be able to:• Describe the important features and functionality of Windows Deployment Services (Windows DS). • Manage images by using Windows Assessment and Deployment Kit (Windows ADK) Tools.• Configure Windows Deployment Services in Windows Server 2012.• Perform deployments with Windows Deployment Services.

After completing this module, students will be able to:• Describe the monitoring tools for the Windows Server 2012 operating system.• Use Performance Monitor to view and analyze performance statistics of programs that are running on their servers.• Monitor event logs to view and interpret the recorded events.

Course dates

Get hands-on instruction and practice configuring advanced Windows Server 2012, including Windows Server 2012 R2, services in this five-day Microsoft Official Course. This course is part three in a series of three courses that provides the skills and knowledge necessary to implement a core Windows Server 2012 infrastructure in an existing enterprise environment.

MS 20412D: Configuring Advanced Windows Server 2012 Services

Duration

5 days

Course Overview

Get hands-on instruction and practice configuring advanced Windows Server 2012, including Windows Server 2012 R2, services in this five-day Microsoft Official Course. This course is part three in a series of three courses that provides the skills and knowledge necessary to implement a core Windows Server 2012 infrastructure in an existing enterprise environment.

The three courses collectively cover implementing, managing, maintaining and provisioning services and infrastructure in a Windows Server 2012 environment. Although there is some cross-over of skills and tasks across these courses, this course focuses on advanced configuration of services necessary to deploy, manage and maintain a Windows Server 2012 infrastructure, such as advanced networking services, Active Directory Domain Services (AD DS), Active Directory Rights Management Services (AD RMS), Active Directory Federation Services (AD FS), Network Load Balancing, Failover Clustering, business continuity and disaster recovery services as well as access and information provisioning and protection technologies such as Dynamic Access Control (DAC), and Web Application Proxy integration with AD FS and Workplace Join.

This course maps directly to and is the preferred choice for hands-on preparation for Microsoft Certified Solutions Associate (MCSA): Exam 412: Configuring Advanced Windows Server 2012 Services, which is the third of three exams required for MCSA: Windows Server 2012 credential.

Note: Labs in this course are based on Windows Server 2012 R2 and Windows 8.1.

Target Audience

This course is intended for Information Technology (IT) Professionals with hands on experience implementing, managing and maintaining a Windows Server 2012 or Windows Server 2012 R2 environment who wish to acquire the skills and knowledge necessary to perform advanced management and provisioning of services within that Windows Server 2012 environment. Candidates who would typically be interested in attending this course will be:• Experienced Windows Server Administrators who have real world experience working in a Windows Server 2008 or Windows Server 2012 enterprise environment.• IT Professionals who are looking to take the exam 412: Configuring Advanced Windows Server 2012 Services.• IT Professionals wishing to take the Microsoft Certified Solutions Expert (MCSE) exams in Datacenter, Desktop Infrastructure, Messaging, Collaboration and Communications will also be interested in taking this course as they prepare for the MCSA exams, which are a pre-requisite for their individual specialties.

Course Objectives

After successfully completing this course, delegates will have the necessary skills to:• Configure advanced features for Dynamic Host Configuration Protocol (DHCP), Domain Name System (DNS), and configure IP Address Management (IPAM) with Windows Server 2012. • Configure and manage iSCSI, BranchCache and FSRM. • Configure DAC to manage and audit access to shared files. • Plan and implement an AD DS deployment that includes multiple domains and forests. • Plan and implement an AD DS deployment that includes locations. • Implement and configure an Active Directory Certificate Services (AD CS) deployment. • Implement an AD RMS deployment. • Implement an AD FS deployment. • Provide high availability and load balancing for web-based applications by implementing Network Load Balancing (NLB). • Implement and validate high availability and load balancing for web-based applications by implementing NLB. • Provide high availability for network services and applications by implementing failover clustering. • Implement a failover cluster, and configure and validate a highly available network service. • Deploy and manage Hyper-V virtual machines in a failover cluster. • Implement a backup and disaster recovery solution based on business and technical requirements.

Prerequisites

Before attending this course, students must have:• Experience working with Windows Server 2008 or Windows Server 2012 servers day to day in an Enterprise environment.

The course pre-requisites can be met by having knowledge equivalent to, or by attendance at, courses 20410C: Installing and Configuring Windows Server 2012 and 20411C: Administering Windows Server 2012 as this course will build upon the knowledge and skills covered in those courses.

Course Contents

Module 1: Implementing Advanced Network ServicesIn this module students will be able to configure advanced features for Dynamic Host Configuration Protocol (DHCP) and Domain Name System (DNS), and configure IP Address Management (IPAM).

After completing this module, students will be able to:• Configure advanced features in DHCP with Windows Server 2012. • Configure the advanced DNS settings in Windows Server 2012. • Implement IP Address Management in Windows Server 2012.

Module 2: Implementing Advanced File ServicesIn this module students will be able to configure file services to meet advanced business requirements.

After completing this module, students will be able to:• Learn how to configure and manage iSCSI. • Implement BranchCache using Windows Server 2012. • Implement Windows Server 2012 features that optimize storage utilization.

Module 3: Implementing Dynamic Access ControlIn this module students will be able to configure Dynamic Access Control (DAC) to manage and audit access to shared files.

After completing this module, students will be able to:• Describe DAC. • Implement and configure components of DAC. • Implement DAC on file servers. • Describe and implement access- denied assistance. • Implement the integration of Work Folders with DAC.

Module 4: Implementing Distributed Active Directory Domain Services DeploymentsIn this module students will be able to plan and implement an Active Directory Domain Services (AD DS) deployment that includes multiple domains and forests.

After completing this module, students will be able to:• Describe how replication works in a Windows Server 2012 AD DS environment. • Configure AD DS sites in order to optimize AD DS network traffic. • Configure and monitor AD DS replication.

Module 6: Implementing AD CSIn this module students will be able to implement an Active Directory Certificate Services (AD CS) deployment.

After completing this module, students will be able to:• Describe and use certificates in business environments. • Describe the Public Key Infrastructure (PKI) components and concepts, and describe the options for implementing a certification authority infrastructure. • Plan and implement an AD CS certification authority infrastructure. • Plan and implement a certificate template deployment using an AD CS certification authority. • Plan and implement certificate distribution and revocation. • Configure and manage key archival and recovery.

Module 7: Implementing Active Directory Rights Management ServicesIn this module students will be able to implement an AD RMS deployment.

After completing this module, students will be able to:• Describe what AD RMS is, and how it can be used to achieve content protection. • Deploy and manage an AD RMS infrastructure. • Configure content protection using AD RMS. • Enable users outside the organization to access content protected by using AD RMS.

Module 8: Implementing and Administering AD FSIn this module students will be able to implement an Active Directory Federation Services (AD FS) deployment.

After completing this module, students will be able to:• Describe the identity federation business scenarios and how AD FS can be used to address the scenarios. • Configure the AD FS prerequisites and deploy the AD FS services. • Implement AD FS to enable SSO in a single organization. • Implement AD FS to enable SSO between federated partners. • Implement the Web Application Proxy and describe WorkPlace Join integration with AD FS.

Module 9: Implementing Network Load BalancingIn this module students will be able to provide high availability and load balancing for web-based applications by implementing Network Load Balancing (NLB).

After completing this module, students will be able to:• Describe how NLB works. • Configure an NLB cluster. • Plan an NLB implementation.

Module 10: Implementing Failover ClusteringIn this module students will be able to provide high availability for network services and applications by implementing failover clustering.

Lessons• Overview of Failover Clustering• Implementing a Failover Cluster• Configuring Highly Available Applications and Services on a Failover Cluster• Maintaining a Failover Cluster• Implementing a Multi-Site Failover ClusterLab: Implementing Failover Clustering• Configuring a Failover Cluster• Deploying and Configuring a Highly Available File Server• Validating the Deployment of the Highly Available File Server• Configuring CAU on the Failover Cluster

After completing this module, students will be able to:• Explain failover clustering features in Windows Server 2012. • Describe how to implement a failover cluster. • Explain how to configure highly available applications and services on a failover cluster. • Explain how to maintain a failover cluster and how to use new maintenance features. • Describe how to implement multi-site failover cluster.

Module 11: Implementing Failover Clustering with Hyper-VIn this module students will be able to deploy and manage Hyper-V virtual machines in a failover cluster.

After completing this module, students will be able to:• Explain options for making virtual machines highly available. • Describe how to implement virtual machines in a failover cluster deployed on a host. • Explain options for moving a virtual machine or its storage. • Explain a high level overview of Microsoft System Center 2012- Virtual Machine Manager (VMM) 2012.

Module 12: Implementing Business Continuity and Disaster RecoveryIn this module students will be able to implement a backup and disaster recovery solution based on business and technical requirements

After completing this module, students will be able to:• Describe the considerations that must be included when you are implementing a disaster recovery solution. • Plan and implement a backup solution for Windows Server 2012. • Plan and implement server and data recovery.

Course dates

Get hands-on instruction and practice configuring and implementing new features and functionality in Windows Server 2012, including Windows Server 2012 R2, in this five-day Microsoft Official Course. This course is designed for IT professional who want to upgrade their technical skills from Windows Server 2008 to Windows Server 2012 and Windows Server 2012 R2. It presumes a high level of knowledge about previous Windows Server technologies and skills equivalent to MCSA: Windows Server 2008 credential.

MS 20417: Upgrading Your Skills to MCSA Windows Server 2012

Duration

5 days

Course Overview

Get hands-on instruction and practice configuring and implementing new features and functionality in Windows Server 2012, including Windows Server 2012 R2, in this five-day Microsoft Official Course. This course is designed for IT professional who want to upgrade their technical skills from Windows Server 2008 to Windows Server 2012 and Windows Server 2012 R2. It presumes a high level of knowledge about previous Windows Server technologies and skills equivalent to MCSA: Windows Server 2008 credential.

The course covers the new features and functionality in Windows Server 2012 and Windows Server 2012 R2, including management, network infrastructure, storage, access control, Hyper-V, high availability and identity federation. Specific technologies covered include Windows PowerShell, storage spaces, Internet Small Computer System Interface (iSCSI), Active Directory, Hyper-V, implementation of remote access solutions such as DirectAccess, VPNs, and Web Application Proxy. The course also covers Failover Clustering, Federation Services as well as access and information provisioning and protection technologies such as Dynamic Access Control, Web Application Proxy integration with Federation Services, and Workplace Join.

This course maps directly to and is the preferred choice for hands-on preparation for Microsoft Certified Solutions Associate (MCSA): Exam 417: Upgrading Your Skills to MCSA Windows Server 2012, which is the upgrade exam for individuals who hold an MCSA: Windows Server 2008 credential.

Note: Labs in this course are based on the General Availability release of Windows Server 2012 R2 and Windows 8.1.

Target Audience

This course is intended for Information Technology (IT) Professionals who are experienced Windows Server 2008 or Windows Server 2008 R2 system administrators who are familiar with carrying out day to day Windows Server management and maintenance tasks. The course will update their skills to Windows Server 2012 and Windows Server 2012 R2. Candidates suitable for this course would be:• Experienced Windows Server Administrators who have real world experience working in a Windows Server 2008 or Windows Server 2008 R2 enterprise environment• IT professionals who have obtained the credential Microsoft Certified Solutions Associate (MCSA) Windows Server 2008 or have equivalent knowledge• IT professional wanting to take the Microsoft Certified Solutions Expert (MCSE) exams in Data Center, Desktop Infrastructure, Messaging, Collaboration, and Communications will also be interested in taking this course as they prepare for the Microsoft Certified Solutions Associate (MCSA) exams, which are a pre-requisite for their individual specialties

Before attending this course, students must have:• Experience with day-to-day Windows Server 2008 or Windows Server 2008 R2 system administration management and maintenance tasks in an Enterprise environment• Obtained the credential Microsoft Certified Solutions Associate (MCSA) Windows Server 2008 or have equivalent knowledge

The course pre-requisites can be met by having knowledge equivalent to, or by attendance at, courses 20410C: Installing and Configuring Windows Server 2012 and 20411C: Administering Windows Server 2012 as this course will build upon knowledge and skills covered in these courses.

Note: It is possible to take this course without having the MCSA: Windows Server 2008 credential once the criteria of equivalent knowledge is met, however subsequent taking and passing on the 417 upgrade exam will not provide the exam taker with the MCSA: Windows Server 2012 credential. This credential upgrade path is exclusively for holders of the MCSA: Windows Server 2008 credential.

Course Contents

Module 1: Installing and Configuring Windows Server 2012This module explains how to install and configure Windows Server 2012. It specifically covers requirements and considerations for installation and the installation of roles and installation types such as Server Core. It also covers the implementation and configuration of remote management of servers running Windows Server 2012.

Module 2: Managing Windows Server 2012 by Using Windows PowerShellThis module explains how to use Windows PowerShell to manage Windows Server 2012. It will provide an overview of Windows PowerShell and the Windows PowerShell Integrated Scripting Environment (ISE). It will also cover Windows PowerShell in the context of AD DS and general server management.

After completing this module, students will be able to:• Describe the storage features in Windows Server 2012.• Configure Internet Small Computer System Interface (iSCSI) storage.• Configure storage spaces.• Configure BranchCache.

Module 4: Implementing Network ServicesThis module explains how to configure advanced features for Domain Name System (DNS) and Dynamic Host Configuration Protocol (DHCP). It also explains how to configure IP Address Management (IPAM) and Network Access Protection (NAP).

After completing this module, students will be able to:• Implement DNS and DHCP enhancements.• Implement IPAM.• Manage IP address spaces with IPAM.• Describe NAP.• Implement NAP.

Module 5: Implementing Remote AccessThis module covers the options for provisioning remote access with Windows Server 2012. It will specifically cover DirectAccess and VPNs and the considerations for implementing and managing these remote access technologies in your Windows Server 2012 environment, including the use of certificates.

After completing this module, students will be able to:• Install and manage the Remote Access role in Windows Server 2012.• Implement DirectAccess by using the Getting Started Wizard.• Implement and manage an advanced DirectAccess Infrastructure.• Implement VPN access in Windows Server 2012.

Module 6: Implementing Failover ClusteringThis module explains how to provide high availability for network services and applications by implementing Failover Clustering. It will provide an overview of the terms and technologies as well as specific considerations and options for the services and applications under discussion.

After completing this module, students will be able to:• Describe Failover Clustering.• Implement a failover cluster.• Configure highly-available applications and services on a failover cluster.• Maintain a failover cluster.• Implement a multisite failover cluster.

Module 7: Implementing Hyper-VThis module explains how to install and configure Hyper-V virtual machines. It will cover general configuration as well as storage and networking considerations. It will also cover differences introduced in Windows Server 2012 R2.

Module 8: Implementing Failover Clustering with Hyper-VThis module explains how to deploy and manage Hyper-V virtual machines in a failover cluster. It will provide an overview of the technologies involved as well as details on general configuration and migration of virtual machines. It will also briefly cover Microsoft System Center 2012 Virtual Machine Manager (VMM).

Module 9: Implementing Secure Data Access for Users and DevicesThis module explains how to configure secure data access for users and devices. It will primarily cover the implementation of Dynamic Access Control (DAC) and Work Folders.

After completing this module, students will be able to:• Describe DAC.• Implement DAC components.• Implement DAC for access control.• Implement access-denied assistance.• Implement and manage Work Folders.

Module 10: Implementing Active Directory Domain ServicesThis module explains how to implement AD DS in Windows Server 2012. It covers the deployment and configuration of domain controllers as well as the use and implementation of service accounts, Group Policy, and services offered by Windows Azure Active Directory. It also covers the general maintenance of AD DS.

Module 11: Implementing AD FSThis module explains how to implement an Active Directory Federation Services (AD FS) deployment. It will cover a single organization usage scenario as well as a business-to-business scenario. The module also covers Web Application Proxy and Workplace Join.

Please call 0141 221 5676 for course information and available dates or email us at info@indiciatraining.com.

This course gives an introduction to both Unix and Linux, versatile and stable operating systems used in business and on many of the servers on the internet. The course is suitable as preparation for the CompTIA Linux+/LPIC-1, Linux Professional Institute examinations.We concentrate on the command line rather than the graphical interface with the most commonly used commands and utilities described in detail as are the use of piping, redirection, wildcards and the vi editor.These systems are easy to learn and use and we expect this course to be a fun and interesting way to master them.Although based on CentOS (Red Hat) Linux the commands and principles learnt may be applied to all other versions of Linux, including Ububtu and SUSE and to all versions of Unix including Solaris, AIX and HP-UX.

Introduction to Unix / Linux

Duration

3 days

Course Overview

This course gives an introduction to both Unix and Linux, versatile and stable operating systems used in business and on many of the servers on the internet. The course is suitable as preparation for the CompTIA Linux+/LPIC-1, Linux Professional Institute examinations.We concentrate on the command line rather than the graphical interface with the most commonly used commands and utilities described in detail as are the use of piping, redirection, wildcards and the vi editor.These systems are easy to learn and use and we expect this course to be a fun and interesting way to master them.Although based on CentOS (Red Hat) Linux the commands and principles learnt may be applied to all other versions of Linux, including Ububtu and SUSE and to all versions of Unix including Solaris, AIX and HP-UX.

Course Objectives

The main aim is that the delegate leaves the course feeling comfortable with the operating system, ready and able to use the system on a daily basis.Upon successful completion of this course, students will have the skills necessary to:• describe the history, structure and main concepts of the system• create and manipulate files and directories• use the vi and vim editors• customise the user environment• use some of the more advanced commands such as find and grep• use backup and restore commands• describe how file permissions are implemented• describe and use the utility sed• create and run simple shell scripts

Prerequisites

Previous knowledge of Linux or Unix is a help but it is not essential.

Course Contents

Accessing the SystemDescribe the history and structure of the operating systemDescribe the advantages and disadvantagesLog on to the system and run some simple commandsChange the password and confirm the changeDescribe the various shells available

Commands and ConceptsDisplay processes running on the systemDisplay partitions and monitor spaceDisplay files and directoriesDescribe the concepts of piping and redirectionUse the switch user commands

Directory CommandsFind out their home and working directoryChange directories to move around the file systemCustomise the prompt and create an aliasCustomise the user environmentCreate and remove directories

Finding Files and Job ControlFind files on the system and execute commands on those filesRedirect output and error messages to a fileRun and stop background jobsSchedule jobs to run at a given timeDescribe how a command may take input from a fileFormat files for printing and print filesView the print queue and cancel print jobs

The vi and vim EditorsDescribe the text editors vi and vimUse these editors to create and alter filesUse various commands to compare two files

Finding Text and SortingFind text within files using grepDescribe and use regular expressionsUse the sort commandUse the commands unique, cut and translate

Backup CommandsDescribe reasons for taking backupsUse the backup utilities such as tarUse the compress utilities such as gzip and bzip2

File PermissionsDescribe the different file permissionsChange file permissions on a file or directoryDescribe how special file permissions operateSet default file permissions for a user